Skip to main content

Secure Client-Side Digital Watermarking Using Optimal Key Selection

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 266))

Abstract

In this paper, we proposed an adaptive secure client-side digital audio watermarking by choosing an optimal embedding key from numerous available embedding keys for the encryption and joint decryption and watermarking procedure of the specific content. In the proposed scheme, the embedding key will determine not only the client-specific watermark content to be embedded, but also the watermarking embedding position where the watermark will be placed. It is obvious that different region of the host signal featured different characteristics, so where to embed the watermark will impact the equilibrium between two basic requirements, known as inaudibility and robustness, of watermarking development. Consequently, how to choose the embedding key for the particular content to be distributed could be of crucial significance. Simulation results show that the watermark in this scheme can survive robustly after being subjected to various common audio attacks, such as filtering, resample and so on.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Maes, M., et al.: Digital watermarking for DVD video copy protection. IEEE Signal Process Mag. 17(5), 47–57 (2000)

    Article  MathSciNet  Google Scholar 

  2. Crowcroft, J., Perkins, C., Brown, I.: A method and apparatus for generating multiple watermarked copies of an information signal. WOPtent/56059 (2000)

    Google Scholar 

  3. Emmanuel, S., Kankanhalli, M.: Copyright protection for MPEG-2 compressed broadcast video. In: ICME 2001, IEEE Int. Conf. on Multimedia and Expo., pp. 203–209 (2001)

    Google Scholar 

  4. Jin, H., Lotspiech, J.: Attacks and forensic analysis for multimedia content protection. In: Proc. of ICME. IEEE Int. Conf. on Multimedia and Expo. (2005)

    Google Scholar 

  5. Anderson, R.J., Manifavas, C.: Chameleon-A new kind of stream cipher. In: Proc. 4th Int. Workshop on Fast Software Encryption, London, U.K, pp. 107–113 (1997)

    Google Scholar 

  6. Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting-Joint fingerprinting and decryption of broadcast messages. In: 11th Australasian Conf. Information Security and Privacy, pp. 136–147 (2006)

    Google Scholar 

  7. Celik, M., et al.: Secure embedding of spread-spectrum watermarks using look-up tables. In: Proc. Int. Conf. Acoustics, Speech and Signal Processing, Honolulu, HI, pp. II-153–II-156 (2007)

    Google Scholar 

  8. Piva, A., Bianchi, T., Rosa, A.D.: Secure Client-Side ST-DM Watermark Embedding. IEEE Trans. on Information Forensics and Security 5(1), 13–26 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jiang, JJ., Pun, CM. (2011). Secure Client-Side Digital Watermarking Using Optimal Key Selection. In: Kim, Th., et al. Communication and Networking. FGCN 2011. Communications in Computer and Information Science, vol 266. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27201-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27201-1_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27200-4

  • Online ISBN: 978-3-642-27201-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics